583 requirements-engineering-"https:"-"https:"-"https:" positions at Monash University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Arts and Literature
- Law
- Science
- Education
- Linguistics
- Materials Science
- Biology
- Mathematics
- Humanities
- Environment
- Chemistry
- Psychology
- Design
- Earth Sciences
- Electrical Engineering
- Philosophy
- Sports and Recreation
- Social Sciences
- 13 more »
- « less
-
of vulnerability. Arguably, cybersecurity scholars need to learn much more about the methods criminals employ to trick victims out of money. This PhD scholarship will extend upon Prof Whitty's work in this field
-
fees (Commonwealth Supported Place or full fee) paid for the duration of their degree, up to a maximum of five years. Applications No application required Total scholarship value Varies Number offered Up
-
projects that involve data analysis, the application of artificial intelligence, the development of new detection techniques, and the exploration of new experimental methods through collaboration with our
-
automatically assessed once you apply for a Monash undergraduate course through VTAC. Applications No application required Total scholarship value Up to $32,000 Number offered Unlimited - offered to all eligible
-
awarded to the highest achieving eligible student based on academic achievement from previous study. Applications No application required Total scholarship value Up to $24,000 Number offered Up to two per
-
at one time. Selection criteria Awarded based on need. To retain this scholarship: You must maintain satisfactory academic progress as defined by the course requirements. How to apply VTAC applicants - If you
-
will apply Be inspired, every day Take your career in exciting, rewarding directions Be a part of an inclusive, collaborative community The Opportunity Are you a marketing professional passionate about
-
interactions. In this research, you need to understand how spins interact with their environment and how to read-out and control single spins. This requires understanding of concepts like atom optics, magnetic
-
Anomaly detection methods address the need for automatic detection of unusual events with applications in cybersecurity. This project aims to address the efficacy of existing models when applied
-
interested in data analytics, business strategy, or the digital creative industries, and provides practical experience in data collection, analysis, and applied industry research. Required knowledge R Packages